Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure Locomotive to Locomotive PTC Communication

a technology for locomotives and communications, applied in the direction of wireless communication, signalling indicators on vehicles, transportation and packaging, etc., can solve the problems of introduction of cyber security issues, first train may not have, nor obtain, information

Active Publication Date: 2020-06-18
WESTINGHOUSE AIR BRAKE TECH CORP
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent text describes a system for secure communication between train cars using a shared secret key. The system includes a central office server and two communication devices on each train car. The method involves generating a secret random number and a public key based on the train cars' identifiers, authenticating the public key based on a private key associated with the train car, and generating a shared secret key based on the two public keys. The system can prevent man-in-the-middle attacks and secure communication between train cars.

Problems solved by technology

The use of such communications as part of a train control system may introduce cyber security issues.
In this attack, public keys, two-factor authentication mechanisms, mutual authentication, digital signatures, etc., are insufficient to certify that the source of the message is the trusted second train, and the first train may not have, nor obtain, information to determine that the message was sent from the second train instead of a nefarious actor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure Locomotive to Locomotive PTC Communication
  • Secure Locomotive to Locomotive PTC Communication
  • Secure Locomotive to Locomotive PTC Communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035]Two trains involved in a communication exchange may be vulnerable to a man-in-the-middle attack (MITM) due to limited information about one another's identities prior to establishing communication. A malicious actor may exploit such deficiencies in a communication exchange by gaining control of the communication exchange when the first train cannot distinguish between communications sent by the malicious actor and the second train. Train control systems may not provide sufficient identifying content to authenticate communication as coming from a particular train of the one or more trains. Additionally, the intermittent and asynchronous nature of train-to-train communication may provide the extra time a malicious actor needs to gain information that can be used to adequately impersonate both trains.

[0036]As disclosed herein, in some non-limiting embodiments or aspects, a computer-implemented method of train-to-train key exchange may include: generating a first secret random num...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for a secure key exchange between two trains operating within a track network may include generating a first or second public key based on a secret random number, generating a shared secret key based on the first or second public key, authenticating one or more key exchange communications by a remote server based on a digital signature established with an on-board key associated with the first train, authenticating a communication by a remote server based on the digital signature of the second train signed with an on-board key associated with the second train, and establishing secure train-to-train communication between the two trains by generating a shared secret key based on a public key received from the other train, the secure key exchange protecting the two trains from a man-in-the-middle attack.

Description

BACKGROUNDField of the Invention[0001]The present invention relates generally to systems and methods of secure key exchange between two locomotives operating within a track network, and in particular, to providing secure key exchange for communications used in establishing a local communication link between two trains within the track network.Description of Related Art[0002]At any given time within a complex track network, one or more trains may be operating and traversing a route in the track network and sending data from one to another using various radio-based methods. For example, a moving block is a signaling block system where blocks are defined in real time by computers to establish safe zones around a first train (e.g., a lead train, etc.) and a second train (e.g., a follower train, etc.). Further, the one or more trains may have on-board communication and control systems that facilitate the safe operation of the one or more trains in a local territory within the network. Fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/08H04L29/06
CPCB61L15/0027H04L9/0838H04L9/085H04L9/0825H04L63/1466B61L15/0036H04L2209/84H04L9/0841H04L9/321B61L15/0072H04L63/1441H04L63/126H04L63/08H04L67/12H04W4/42H04W12/50H04W12/122H04W12/069B61L27/40
Inventor DREASHER, REBECCA W.CRAVEN, STEPHENVRBA, MATTHEW STEVEN
Owner WESTINGHOUSE AIR BRAKE TECH CORP